Network Invariant-Based Fast Simulation for Large Scale. TCP/IP networks.

Size: px
Start display at page:

Download "Network Invariant-Based Fast Simulation for Large Scale. TCP/IP networks."

Transcription

1 Network Invariant-Based Fast Simulation for Large Scale TCP/IP Networks Hwangnam Kim, Hyuk Lim, and Jennifer C. Hou Department of Computer Science University of Illinois at Urbana-Champaign 21 N. Goodwin, Urbana, IL {hkim27, hyuklim, ABSTRACT In this paper, we present a rescaling simulation methodology (RSM) to expedite simulation in large-scale TCP/IP networks without loss of fidelity of simulation results. Conceptually, we scale down the network to be simulated to reduce the number of events, simulate the downscaled network for a short period of time, and then extrapolate the corresponding results for the original network by scaling up the simulation results obtained from the downscaled network. Both the operations of scaling down and rescaling up the network are conducted in such a manner that the network invariant, called the bandwidth-delay product, is preserved. In particular, since the dynamics of queues, such as the queue size, the dropping probability, and other parameters at every link are the same in both the original and downscaled network, RSM can accurately infer the network dynamics behavior of the original network (equipped with various Active Queue Management (AQM) strategies). In contrast to SHRiNK [17], RSM does not make any assumption on the input traffic and can work with any AQM strategy. It also preserves the queue dynamics and the network capacity as perceived by TCP connections. To validate the proposed methodology, we have implemented RSM based simulation in ns-2, and conducted a simulation study comparing RSM based simulation against packet level simulation, with respect to the capability of capturing transient, packet-level network dynamics, the execution time and the discrepancy in simulation results. The simulation results indicate an order of magnitude or more improvement (maximally 5 times) in execution time and the performance improvement becomes more prominent as the network size increases (in terms of number of nodes and network capacity) or as the scaling parameter decreases. The error discrepancy between RSM based simulation and packet level simulation, on the contrary, is minimally 1-2 % and maximally 1 % in a wide variety of network topologies (with various AQM strategies) and traffic loads. The encouraging simulation results, coupled with the fact that implementation of RSM is simple and straightforward, suggest that RSM can be used to simulate, and accurately infer network dynamics of, largescale TCP/IP networks. Keywords performance modeling and simulation, rescaling simulation methodology, large scale networks, AQM 1. INTRODUCTION Modern data communication networks are extremely complex and do not lend well to theoretical analysis. With computer/network entities and techniques interacting and interfering with one another, optimization problems do not have a simple and regular structure that allows us to neatly fit it into the framework of established optimization theories. As a result, it may be more feasible to carry out simulation to study and evaluate the performance of network entities and protocols, and interaction among them. The major obstacle in packet-level network simulation is, however, the vast number of packets that have to be simulated in order to produce accurate results, especially in large-scale networks. Each packet will generate a number of events (e.g., arrival of a packet at the router, its departure, and its queuing, just to name a few) on the path from the source to the destination and each event has to be executed at some specified time point. As the CPU time required is roughly proportional to the number of events that have to be executed, packet-level simulation easily becomes computationally expensive, if not infeasible, when the network size and/or the traffic amount is extremely large. What seems to be a reasonable solution is really to combine theoretical modeling with packet-level simulation [14, 16, 19]. The notion of fluid model based simulation is proposed to reduce the computational load in packet level simulation [8, 11, 13, 19, 21]. Conceptually a fluid model a set of differential equations that characterize the network dynamics is adopted and incorporated into the simulation engine. In the course of simulation, a sequence of closely-spaced packets is abstracted into a fluid chunk (usually characterized by the fluid rate) and the fluid model is used to obtain the parameters of interest (e.g., the system throughput). In spite of its effectiveness in terms of reducing the execution time, fluid model based simulation is not well-suited for studying the network behavior under light and/or sporadic traffic, as it is built upon the assumption of existence of a large number of active flows in the network (so that the composite traffic can be modeled as a flow). To deal with this issue, network calculus-based simulation was proposed [9]. Kim and Hou [9] characterize how TCP congestion control additive increase and multiplicative decrease (AIMD) interacts with AQM strategies with network calculus theory 1

2 [1, 3, 5], derive upper and lower bounds on the attainable TCP throughput, incorporate the models in ns-2, andthen instrument the simulator to regulate TCP flows in compliance with the model. Although network calculus-based simulation indeed gives encouraging results, it cannot provide the packet level dynamics, such as the instantaneous queue length and packet dropping probability, due to the use of network calculus. (Note that fluid model based simulation also suffers from this shortcoming.) In this paper, we take a dramatic departure from the above approaches and propose a new rescaling simulation methodology (RSM) for simulating large-scale TCP/IP networks. As mentioned above, as the number of events increases with the network size and the amount of traffic, the computational cost increases accordingly. If we can scale down the network to one that can be simulated at the packet level in a short time interval to produce sufficient results and extrapolate, without loss of accuracy, results for the original network, we can significantly reduce the computational cost and yet preserve the network dynamics. Now the key issue is how to preserve the properties that characterize the original network in the downscaled network so that accurate results can be extrapolated after the packet-level simulation. In particular, the network property of interest should remain invariant in the process of scaling down and rescaling up the network. For the purpose of simulating large-scale TCP/IP networks, we use the bandwidth-delay product as the network property to be preserved, as it represents the capacity of the pipe, i.e., the amount of data packets that can be transmitted without waiting for the acknowledgment [18]. That is, we scale down the original network by reducing the link capacitybyafraction ( < 1), increasing the link delay by 1, but keeping the bandwidth-delay product constant. (Notethatwechangeneitherthenumberofnodes/flows nor the queue (the maximum buffer size or the AQM parameters.)) By preserving this product invariant during the down/up scaling operations, the network capacity as perceived by each TCP connection is preserved, and we can formally prove that the queue dynamics (e.g., the instantaneous queue length), the RTT dynamics, and the TCP window size dynamics remain unchanged in the operations. We have also carried out ns-2 simulation comparing RSM based simulation against packet level simulation, with respect to the capability of capturing the transient, packet-level network dynamics, the execution time, and the discrepancy in simulation results. The simulation results indicate an order of magnitude or more improvement (maximally 5 times) in execution time and the performance improvement becomes more prominent as the network size increases (in terms of number of nodes and network capacity) or as the scaling parameter decreases. The error discrepancy between RSM based simulation and packet level simulation, on the contrary, is minimally 1-2 % and maximally 1 % in a wide variety of network topologies (with various AQM strategies) and traffic loads. The notion of scaling down/up the network to facilitate network monitoring and performance prediction has also been used in Small-scale Hi-fidelity Reproduction of Network Kinetics (SHRiNK) [17]. SHRiNK proposes two methods: one deals with IP networks with long-lived flows and the other with a mixture of long-lived and short-lived flows. Both methods reduce the amount of data packets by sampling real traffic over the network, and then simulate in a downscaled network with the sampled traffic in order to predict the behavior in the original network. In the first method, the link capacity, the maximum buffer size (along with AQM parameters, e.g., the minimum/maximum thresholds in RED, used) at each link, and the number of flows are proportionally reduced, while the end-to-end delay is kept as the invariant. (As will be elaborated on in Section 2, the queue dynamics is changed under the first method.) The second method resembles RSM in that the link capacity is reduced and the link delay is proportionally increased. Their theoretical analysis and simulation study to validate their design, however, focus only on the first method, and the theoretical base for the second method is simply lacking. Moreover, in order not to change the property of the original input traffic, both methods rely heavily on the assumption that each input flow is a Poisson process. The rest of the paper is organized as follows. In Section 2, we give a summary of existing work that aim to expedite network simulation. In Sections 3 4, we present RSM, formally prove that it preserves network dynamics, and validate its correctness. Following that we elaborate on how we implement RSM in ns-2, and present our simulation results in Section 5. Finally we conclude the paper in Section RELATED WORK In this section we summarize existing work that pertains to the issue of expediting network simulation, while retaining its accuracy. Fluid model-based simulation: Several research efforts have focused on fluid model based simulation. Liu et al. [11] demonstrated the fundamental performance gain in fluid model based simulation over, rather than a realistic network with detailed network protocols, simple network components. Milidrag et al. [13] presented various sets of differential equations that describe the behaviors of network components in the continuous time domain. They showed that as long as the behavioral characteristics in the continuous time domain can be exactly specified, fluid simulation gives results with reasonable error bounds. Wu et al. [21] studied the error behavior that simulation results exhibit in a simple M/D/1 network configuration. Fluid models have also been used to study the throughput behavior of TCP and congestion control algorithms, together with active queue management in the steady state [15, 16, 19]. Liu et.al. [12] solve one of the existing fluid models with the numerical Runge-Kutta method, and incorporate numeric results in the simulation of large scale IP networks. Kim and Hou [8] investigate the feasibility of fluid model based simulation for IEEE Operated wireless LANs (WLANs), in which a throughput model is developed to describe data transmission activities in wireless LANs and then used to implement fluid model based simulation in ns-2. Their results show two orders of a magnitude improvement with acceptable error bounds. As indicated in Section 1, fluid model based simulation may not render satisfactory performance (in terms of the discrepancy between results obtained in packet level simulation and fluid model based simulation) in the case of light and/or sporadic traffic, as it relies on the assumption of existence of a large number of flows [12, 15, 19]. It is also limited to show kinetic transient behaviors of the network. Network calculus-based simulation: 2

3 Kim and Hou [9] examine the feasibility of incorporating network calculus models in simulating TCP/IP networks. By exploiting network calculus properties, they characterize how TCP congestion control additive increase and multiplicative decrease (AIMD) interact with AQM strategies in the analytic model, and regulate TCP flows in a simulation engine with the derived model. They show that as compared to time stepped hybrid fluid simulation (TSHS), significant improvement can be made in expediting the simulation, while keeping the error discrepancy reasonably small. As indicated in Section 1, although network calculus-based simulation gives accurate steady state system throughput, it cannot show, due to the nature of network calculus, the transient behavior of the network, e.g., the instantaneous queue length and the packet dropping probability at each bottleneck link. Simulation based on scaling down the network: Pan et al. [17] introduce two SHRiNK methods to sample, simulate, and predict the network behavior. The first method deals with IP networks with long-lived flows and the other with a mixture of long-lived and short-lived flows. A proportion of the traffic flows are independently sampled and collected. The original network is reduced to a downscaled one and fed with the sampled traffic. In the first method, the downscaling operation is performed by reducing the number of flows, the link capacity, the maximum buffer sizes, and AQM parameters, while keeping the endto-end delay invariant. In order to keep the end-to-end delay invariant, the queue dynamics has to be approximated (by certain linear functions) and may respond differently to each TCP connection. As a result, the network capacity as perceived by each TCP connection during its interaction with the network is changed. Moreover, in cases where the queue dynamics cannot be adequately approximated with linear functions, e.g., when DropTail is used as the AQM strategy, SHRiNK cannot operate correctly. Although similar to RSM, the second SHRiNK method was presented without theoretical reasoning. In addition, both SHRiNK methods rely heavily on the assumption that each input flow is a Poisson process. RSM can be universally applied to long-lived and shorted-lived TCP connections, the down/up scaling operations in RSM do not change the queue dynamics (which will be rigorously proved), and its correctness does not rely on any assumption. 3. RESCALING SIMULATION METHOD- OLOGY In this section, we present the rescaling simulation methodology. The key idea of the methodology is to preserve the network capacity (as determined by the queue dynamics) during the down/up scaling operation. We first discuss the network invariant in simulating TCP/IP networks. Then we introduce the rescaling simulation model based on the network invariant. 3.1 Network Invariant Our objective is to scale down a large scale network to a small one that can be simulated in a short period of time to produce sufficient results. The down scaling operation expedites network simulation by reducing the number of events generated/processed in the simulation. For example, if we reduce the link capacity at each link, we can reduce the number of sending and receiving events per unit time at the link. Similarly, if we increase the propagation delay at each link, we can reduce the sending rate of each TCP connection (as a result of increased round trip time.) One important issue is then how to scale down the network so that the simulation results obtained from the downscaled network can be used to accurately infer those corresponding to the original network. We claim that the down scaling operation should not change the network capacity as perceived by TCP connections. Note that the network capacity is determined by the network dynamics (such as the instantaneous queue length, to which TCP connections respond) and is reflected upon the TCP throughput. Hence for the purpose of simulating large-scale TCP/IP networks, we use the bandwidth-delay product as the network invariant to be preserved during the down/up scaling operations. In the perspective of a TCP connection, the bandwidth-delay product represents the amount of data packets that can be in transit without waiting for the acknowledgment [18]. Specifically, let B and D denote, respectively, the available bandwidth and delay along a path in the original network, and P BDP the bandwidth-delay product along the path. For notational convenience, we denote the corresponding variables in the downscaled network by attaching an apostrophe to the variables, i.e., B, D,andP BDP. The following constraint is used in the down/up scaling operations: P BDP = B D = B D = P BDP. (1) By Eq. (1), a scaling parameter,, is determined as follows: where < 1. B = B, (2) D = D, (3) Note that we do not change the number of nodes, the number of flows, or the queue-related parameters (e.g., the maximum buffer size or the AQM parameters). The only parameters that are scaled are the link capacity and the link delay. As will be formally proved in Section 3.2, by keeping P BDP invariant, the queue dynamics (e.g., the instantaneous queue length), the RTT dynamics, and the window size dynamics remain unchanged in the operations, and hence the network capacity as perceived by each TCP connection is preserved. As a result, the downscaled network exhibits exactly the same behavior as the original network. 3.2 Rescaling Simulation Model We now propose the rescaling simulation model. Let N denote the number of flows sharing a path with the bottleneck link of capacity C. Let q(t) and p(t) denote, respectively, the queue length and the packet dropping probability of the bottleneck link at time t, and T the propagation delay of the path. Let W i(t) andr i(t) denote, respectively, the window size and the round trip time of flow i at time t. Then the interaction between TCP flows and the bottleneck link can be characterized with the TCP model given in [14]: R i(t) = T + q(t) C dq dt dw i(t) dt = = NX i=1 (4) W i(t) R i(τ i) C (5) 1 Wi(τi) β Wi(t) p(τi), (6) R i(t) R i(t) 3

4 where β is the multiplicative parameter, p( ) is the packet dropping probability, and τ i = t i R i(t). The rescaling simulation model reduces the link bandwidth and increases the link delay by the scaling parameter, (Eqs. (2) and (3)). Hence, the time instants at which packet events occur are also delayed by 1, since each packet is served at times smaller bandwidth (which stretches its transmission time by 1 ) and experiences 1 times larger delay. Specifically, a packet event that occurs at time t in the original network is now delayed to t in the downscaled network as follows: t = 1 t, (7) where t(t ) and t (t ) define, respectively, a time instant for the original network and for the downscaled network. In what follows, we will investigate the dynamics of the queue length, the round trip time, and the TCP window size in both the downscaled network and the original network. Again we denote the corresponding variables in the downscaled network by attaching an apostrophe to the variables Queue Dynamics We will show that queue length of the bottleneck link in the original network is the same to that in the downscaled network: q (t )=q(t) and q = q This implies that the downscaled network responds to each TCP connection in exactly the same manner as the original network does. Moreover, this is achieved without modifying or approximating any AQM parameter in the downscaled network. We first look at dq dt : dq dt = = NX NX i=1 i=1 N = ( X P i,bdp (t) D i (t) C P i,bdp (t) C i=1 D i (t) P i,bdp (t) D i(t) C = dq dt dq =. (8) dt 1 Note that in Eq. (8), the change in the queue size is simply the difference between the arrival rate of all flows and the link capacity, and the arrival rate of a flow i is obtained by dividing its current bandwidth-delay product (P i,bdp (t)) by its current delay (D i(t)). Since t = 1 t (Eq. (7)), dt = 1 dt, and thus, dq dt = dq dt, or dq dt = dq dt. (9) ) Since q () = q() = and Eq. (9) is a separable first order equation [4], we can obtain the following result by integrating both sides of Eq. (9) when t, t : q (t )=q(t). (1) By Eq. (1), we know as long as the down scaling operation preserves the bandwidth-delay product of the original network, the queue dynamics in both the original network and the downscaled network are the same at each event time RTT Dynamics We can compute the round trip time in the downscaled time domain, t, as follows. Since R i(t) =T + q(t) C R i(t ) = T + q (t ) C = T + q(t) C = 1 q(t) (T + C ) = 1 Ri(t). (11) Note that we have used q (t )=q(t) in the second equality in Eq. (11). With Eq. (11), we can now re-express dq (t ) in Eq. (8) as dt follows: dq dt = = NX NX i=1 i=1 N = ( X W i (t) R i (τ i ) C W i(t) C R i (τ i ) i=1 W i(t) ) R C i(τ i) = dq dt, where the first equality results from the fact that the current TCP window size (W i(t)) can be represented by the current bandwidth-delay product (P i,bdp (t)) as perceived by each TCP connection i Window Size Dynamics Eq. (11) implies that each TCP connection in the downscaled network exhibits the same window dynamics but the response is 1 times slower than that in the original network (since a TCP connection in the downscaled network adjusts its rate per round trip time R i(t)). To further verify this, we define the window dynamics in the downscaled network basedoneq.(6)asfollows: dw i = 1 dt R i (t ) β W i (t ) W i (τ i) R i (t ) p(τ i), (12) where τ i = t R i(t ). By plugging Eq. (11) into Eq. (12), we have dw i 1 = dt 1 Ri(t) β Wi(t) W i(τ i) p(τi) 1 Ri(t) = ρ 1 ff Wi(τi) β Wi(t) R i(t) R p(τi) i(t) = dwi dt, (13) 4

5 where τ i = t R i(t). Note that in the first equality of Eq. (13), we use the current bandwidth-delay product of the path as the current window size, and hence W i (x )= W i(x), for x = 1 x. Additionally, τ i = 1 τi since R i(t )= 1 Ri(t) (Eq. (11)), and p( ) =p ( ) sinceq (t )= q(t) (Eq. (1)), for t = 1 t. As implied in Eqs. (11) and (13), all the events that occur in the original network are delayed by the factor of 1 in the downscaled network. This is consistent with Eq. (7). T/scale prop. delay C*scale link capacity prop. delay capacity RTT queue size round trip time capacity queue size arrival rate queue queue size drop prob. RED number of nodes N RTT rate drop prob. TCP model Comparison with SHRiNK As compared to SHRiNK [17], RSM possesses several desirable features: (i) RSM does not make any assumption on the input traffic, while SHRiNK relies heavily on the Poisson assumption for the input traffic. (ii) RSM preserves the queue dynamics and hence preserves the network capacity as perceived by TCP connections. In contrast SHRiNK approximates the queue dynamics in the downscaled network in order to preserve the queuing delay. As a result, the downscaled network may respond differently to TCP connections. (iii) RSM can work together with any AQM strategy, while SHRiNK cannot be used if the modified queue dynamics cannot keep the queuing delay invariant in the downscaled network. For example, as reported in [17], if the AQM strategy is DropTail, SHRiNK cannot produce accurate results. 4. VALIDATION OF RSM WITH MATLAB In this section, we validate RSM (Section 3) with MATLAB [2]. The specific effect when we use the RSM model with a scaling parameter is that all the events that occur at time t(t ) in the original network are delayed to t (t ) = 1 t in the downscaled network. This is attributed to the fact that the link bandwidth is scaled down by the factor of and the link delay is scaled up by the factor of 1 during the down-scaling operation. The dynamic network behavior that the original network exhibits at any time instant can be observed in the downscaled network, except that the time instant at which each event occurs is delayed by the factor 1 (Eqs. (13) and (7)). In what follows we investigate the trajectory of the queue length and transient alteration of the dropping probability at a link to verify Eqs. (13) and (7). Figure 1 gives a MATLAB Simulink diagram that implements the interaction between a bottleneck link (equipped with RED) and multiple TCP flows. In the figure, the RTT module executes the operation given in Eq. (4), the queue module executes the function given in Eq. (5), the RED module performs the RED operations at the link [6] and the TCP module carries out the dynamics given in Eq. (6). Additionally, the prop. delay module and the link capacity module represent, respectively, the delay and the capacity of the link, and N is the number of flows. Figures 2 and 3 give, respectively, the kinetic dropping probability and the instantaneous queue length for the bottleneck link in Figure 1 (N = 1). Figure 2 (a) presents the dynamic trajectories of the packet dropping probability of the link in the down-scaled network, where each trajectory corresponds to a different value of the scaling parameter. Note that events are delayed by the factor of 1. Figure 2 (b) gives the trajectories of the packet dropping probability after the network is re-scaled up with. Note that all the trajectories agree with one another. Figure 3 gives the instantaneous queue length of the link in the down-scaled network ((a)) and after the network is re-scaled up ((b)). Conclusions similar to those made for Figure 2 can be drawn. Figure 1: The MATLAB Simulink diagram for TCP dynamics 1 Mbps 1 msec 1 Mbps 1 msec 1 Mbps 1 msec 1 Mbps 1 msec 1 Mbps 1 Mbps 1 Mbps 1 msec 1 msec 1 msec 1 Mbps 1 msec 1 Mbps 1 msec 1 Mbps 1 msec 1 Mbps 1 msec 1 Mbps 1 msec 1 Mbps 1 msec Sink 1 Mbps 1 msec 1 Mbps 1 msec 1 Mbps 1 msec Sink Class Class 1 Figure 4: The network configuration used in the second set of experiments. 5. SIMULATION STUDY In this section, we discuss how we implement RSM in ns-2 [2] and conduct a simulation study, comparing the network behaviors (e.g., the queue dynamics) and the steady state behavior (e.g., the TCP throughput) obtained in RSM-based simulation and packet level simulation. 5.1 Implementation Recall that the key idea of RSM is to reduce the number of events in the simulation by scaling down the original network (i.e., decreasing the link capacity and increasing the link delay by the same factor), while preserving the bandwidthdelay product invariant in the down-scaled network (Section 3). As a result, neither the number of flows nor the queue-related parameters (e.g., the maximum buffer size and AQM parameters) need to be changed. As a matter of fact, the implementation of RSM is quite simple and straightforward. The network simulator takes as input the network topology and the scaling parameter, scales down the original network, carry out packet-level simulation in the downscaled network for a short period of time, and then extrapolates the results corresponding to the original network. Only a light-weight preprocessor and a post-processor are needed to scale down the network and to extrapolate the simulation results. 5.2 Simulation We have carried out an extensive ns-2.1b9a simulation study in a wide variety of network topologies and traffic loads, to assess the effectiveness of RSM in terms of reducing the execution time and capturing both the transient, packetlevel network dynamics and the steady state network performance. Due to the space limit, in what follows we present 5

6 1 1 Drop probability scale 1..2 scale.5 scale.2 scale.1 scale (a) Packet dropping probability in the down-scaled network Drop probability scale 1..2 scale.5 scale.2 scale.1 scale (b) Packet dropping probability after the network is rescaled up Figure 2: Trajectories of the packet dropping probability in the down-scaled network and after the network is re-scaled up with the same scaling parameter Queue size 6 4 scale 1. 2 scale.5 scale.2 scale.1 scale (a) Queue length in the down-scaled network Queue size 6 4 scale 1. 2 scale.5 scale.2 scale.1 scale (b) Queue length after the network is re-scaled up. Figure 3: Trajectories of the instantaneous queue length in the down-scaled network and after the network is re-scaled up with the same scaling parameter. 1 Mbps 1 msec 1 Mbps 1 msec 1 Mbps 1 msec different variations of TCP, are used in the transport layer, but due to the space limit, we only present results with TCP Reno connections. 1 Mbps 1 msec 1 Mbps 1 msec 1 Mbps 1 msec 1 Mbps 1 msec 1 Mbps 1 Mbps 1 msec 1 msec Sink 1 Mbps 1 msec 1 Mbps 1 Mbps 1 msec 1 msec Sink 1 Mbps 1 msec 1 Mbps 1 msec Class Class 1 Class 2 Figure 5: The network configuration used in the third set of experiments. only simulation results obtained in the two network configurations given in Figures 4 and 5. (Note that the configuration in Figure 4 has one bottleneck, while that Figure 5 has two bottleneck links.) Both the link bandwidth and the link delay are labeled in the figure, unless otherwise specified. Both short-lived and long-lived TCP connections, as well as Sink Each router is equipped with a buffer of size 1 packets, and the default packet size is set to be 5 bytes. Different AQM strategies are employed at routers in different simulation runs. The setting of parameters in the various AQM strategies is as follows. The minimum and maximum threshold of RED is 3 and 7, respectively. The update interval, reference value, and gain of REM are 1 ms, 5, and.1, respectively. The reference queue size and sampling frequency of PI is 5 and 1 times per second, and the remaining parameters, such as kp and ki (which in turn decides a and b) are determined in compliance with [7]. The desirable utilization, γ, of AVQ is set to.98, and the damping factor,, is determined in compliance with Theorem 1 in [1] to ensure system stability ( =.15). All the experiments are conducted in Linux on a Pentium 4/1.9 Ghz PC with 1 GBytes memory and with 2 GBytes swap memory. 6

7 5.2.1 Performance in the presence of long-lived TCP connections In this section, we study how effective RSM based simulation is in simulating long-lived TCP flows. Performance of RSM based simulation w.r.t. network dynamics First, we examine how closely the network dynamics obtained under RSM based simulation exhibit to that under packet level simulation. Figure 6 depicts the instantaneous queue length versus time in the network configuration given in Figure 4. in each class varies from 5 to 1, and the scaling parameter varies from.2 to 1. in these simulation runs. Also, router nodes employ a different AQM strategy in each simulation run. Due to the space limit, we only present in Figure 6 the case of 1 nodes per class. Regardless of the AQM strategy employed or the value of the scaling parameter, the queue length extrapolated from the downscaled network agrees extremely well with that observed in the original network. Figure 7 depicts the instantaneous queue length of the second bottleneck link versus time in the network configuration in Figure 5, but two cases are presented: the case of 2 nodes per class and the case of 1 nodes per class. Again the instantaneous queue lengths extrapolated from the downscaled network (the curves labeled with scale.2 ) agree extremely well with that in the original network. Performance of RSM based simulation w.r.t. error discrepancy We now quantitatively evaluate the discrepancy between results obtained in RSM based simulation and those in packet level simulation. In both simulation modes, the TCP throughput is measured at a receiver and summed up to give the total throughput per class and the total throughput for the network. Figure 8 gives the total number of packets received at class nodes and at all the nodes, in the network configuration given in Figure 4. Each simulation run lasts for 1 seconds. The error discrepancy observed between two simulation modes is at most approximately 1 % of the capacity of the bottleneck link. Figure 9 gives the total number of packets received at class nodes and at all the nodes, in the the network configuration given in Figure 5. Again each simulation run lasts for 1 seconds. Again the error discrepancy is at most approximately 1 % of the capacity of the bottleneck link. Performance of RSM based simulation w.r.t. execution Time We now evaluate the performance gain of RSM (as compared to packet level simulation) in terms of the execution time required to carry out the simulation. Figure 1 depicts the execution time versus the number of nodes in a 1- second simulation run in the network configuration given in Figure 4. The simulation results indicate an order of magnitude or more improvement (maximally 5 times) in execution time and the performance improvement becomes more prominent as the network size increases (in terms of number of nodes and network capacity) or as the scaling parameter decreases. Figure 11 depicts the execution time versus the number of nodes in a 1-second simulation run in the network configuration given in Figure 5. The speed-up in execution time as a result of using RSM can be as large as approximately 5 times Performance in the presence of long- and shortlived TCP connections In this section, we explore more dynamic scenarios in which long-lived and short-lived TCP connections co-exist and interfere with each other. Each short-lived connection is generated by a Pareto traffic generator in ns-2 in the way that packets are sent at a fixed rate of 2 Kbps during the on periods and no packets are sent during the off periods. The length of each on/off period follows a Pareto distribution with the Pareto shape parameter of 1.5 and the mean value of 1 ms. The application frame size is set 21 bytes. Each simulation run lasts for 3 seconds, and short-lived connections are only active in the interval [1, 2] seconds. (We have also carried out experiments in which all the TCP connections are short-lived. As the results exhibit similar trends, they are not repeat here.) Performance of RSM based simulation w.r.t. network dynamics Figure 12 depicts the instantaneous queue length versus time in the network configuration given in Figure 4, except that the capacities of all the link, excluding the bottleneck link, are increased to 1 Mb. There are 1 nodes per class. As shown in Figure 12, the dynamic changes of the queue length in the downscaled network agree very well with the original behavior. It should be noted that the simulation results in Figure 6 are the instantaneous queue lengths rescaled from the downscaled network, while those in Figure 12 are not rescaled. The same queue dynamics can still be observed even if the events (arrival/departure of short-lived TCP connections) are not delayed (by the factor of ) in the time-stretched, down-scaled network. This result shows that we do not have to worry about one pitfall of RSM-based simulation that if the simulation time is not proportionally increased in simulating the downscaled network, some of the dynamic events may not be executed in time before the simulation ends. Figure 13 gives the total number of packets received at class nodes in the network configuration given in Figure 4. Error discrepancy claims that similar to those in the presence of only long-lived TCP connections can be make here. Performance of RSM based simulation w.r.t. error discrepancy We again quantitatively evaluate the discrepancy between results obtained in RSM based simulation and those in packet level simulation. Figure 13 gives the total number of packets received at class nodes in the network configuration given in Figure 4. Each simulation run lasts for 3-seconds. The error discrepancy observed between two simulation modes is still within approximately 1 % of the capacity of the bottleneck link. Performance of RSM based simulation w.r.t. Execution Time We evaluate again the performance gain of RSM (as compared to packet level simulation) in terms of the execution time required to carry out the simulation. Figure 14 depicts the execution time versus the number of nodes in a 3- second simulation run in the network configuration given in 7

8 12 1 scale 1. scale scale 1. scale scale 1. scale (b) DropTail (d) RED (f) REM scale 1. scale scale 1. scale (h) PI (j) Virtual Queue Figure 6: Instantaneous queue length versus time in the network configuration given in Figure 4 when the number of nodes per class is 1. The curve labeled with scale 1. is the instantaneous queue length in the original network and that labeled with scale.2 is the instantaneous queue length extrapolated from thedownscalednetwork. Figure 4. The same conclusion made in the case of only longlived TCP connections can be applied here, except that a performance improvement of at most 3 times (rather than 5 times) is observed. 6. CONCLUSION In this paper, we present the rescaling simulation methodology (RSM) for simulating large-scale TCP/IP networks. Specifically, we scale down the original network by reducing the link capacity by a fraction, increasing the link delay by 1, but keeping the bandwidth-delay product constant. (Notethatwechangeneitherthenumberofnodes/flows nor the queue (the maximum buffer size or the AQM parameters.)) By preserving this product invariant during the down/up scaling operations, the network capacity as perceived by each TCP connection is preserved, and we formally prove that the queue dynamics (e.g., the instantaneous queue length), the RTT dynamics, and the window size dynamics remain unchanged in the operations. Implementation of RSM in a network simulation is simple, straightforward, and requires only a simple preprocessor/postprocessor to scale down and re-scale up the network. We have also carried out ns-2 simulation comparing RSM based simulation against packet level simulation, with respect to the capability of capturing transient, packet-level network dynamics, the execution time and the discrepancy in simulation results. The simulation results indicate an order of magnitude or more improvement (maximally 5 times) in execution time and the performance improvement becomes more prominent as the network size increases (in terms of number of nodes and network capacity) or as the scaling parameter decreases. The error discrepancy between RSM based simulation and packet level simulation, on the contrary, is minimally 1-2 % and maximally 1 % in a wide variety of network topologies (with various AQM strategies) and traffic loads. The encouraging simulation results, coupled with the ease in implementation, suggest that RSM can be used to simulate, and accurately infer network dynamics of, large-scale TCP/IP networks. We have identified several directions for future work. First, we will theoretically analyze the relationship between the error discrepancy and the scaling parameter. Second, we will carry out experiments with a mixture of TCP and UDP traffic. We conjecture that UDP traffic has to be scaled down in the down scaling operation, and will look into this issue. Finally, we will also include in our study wireless LANs in part of the large scale networks. 7. REFERENCES [1] F. Bacceli, G. Cohen, G. J. Olsder, and J.-P. Quadrat. Synchronization and Linearity. John Wiley & Sons, [2] U. Berkeley, LBL, USC/ISI, and X. PARC. The ns Manual. April 22. [3] J.-Y. L. Boudec and P. Thiran. Network Calculus. Springer-Verlag, 22. [4] C. R. Wylie Jr. Advanced Engineering Mathematics (second edition). McGraw-Hill Book Company, Inc., 196. [5] C.-S. Chang. Performance Guarantees in Communication Networks. Springer-Verlag, 2. [6] S. Floyd and V. Jacobson. Random early detection gateways for congestion avoidance. IEEE/ACM Transactions on Networking, 1(4),

9 12 1 scale 1. scale scale 1. scale (a) DropTail with 2 nodes per class 12 1 scale 1. scale (b) DropTail with 1 nodes per class 12 1 scale 1. scale (c) RED with 2 nodes per class (d) RED with 1 nodes per class 12 1 scale 1. scale scale 1. scale (e) REM with 2 nodes per class (f) REM with 1 nodes per class 12 1 scale 1. scale scale 1. scale (g) PI with 2 nodes per class (h) PI with 1 nodes per class 12 1 scale 1. scale scale 1. scale (i) Virtual Queue with 2 nodes per class (j) Virtual Queue with 1 nodes per class Figure 7: Instantaneous queue length versus time in the network configuration given in Figure 5. 9

10 1.4e+6 2.5e+6 1.2e+6 1e Scale 1. 4 Scale.5 Scale.2 2 Scale.1 Scale.5 Scale (a) Class with DropTail 2e+6 1.5e+6 1e+6 Scale 1. Scale.5 5 Scale.2 Scale.1 Scale.5 Scale (b) All classes with DropTail 1.2e+6 2.5e+6 1e Scale 1. Scale.5 Scale.2 2 Scale.1 Scale.5 Scale (c) Class with RED 2e+6 1.5e+6 1e+6 Scale 1. Scale.5 5 Scale.2 Scale.1 Scale.5 Scale (d) All classes with RED 1.4e+6 2.5e+6 1.2e+6 1e Scale 1. 4 Scale.5 Scale.2 2 Scale.1 Scale.5 Scale (e) Class with REM 2e+6 1.5e+6 1e+6 Scale 1. Scale.5 5 Scale.2 Scale.1 Scale.5 Scale (f) All classes with REM 1.2e+6 2.5e+6 1e Scale 1. Scale.5 Scale.2 2 Scale.1 Scale.5 Scale (g) Class with PI 2e+6 1.5e+6 1e+6 Scale 1. Scale.5 5 Scale.2 Scale.1 Scale.5 Scale (h) All classes with PI 1.4e+6 2.5e+6 1.2e+6 1e Scale 1. 4 Scale.5 Scale.2 2 Scale.1 Scale.5 Scale (i) Class with Virtual Queue 2e+6 1.5e+6 1e+6 Scale 1. Scale.5 5 Scale.2 Scale.1 Scale.5 Scale (j) All classes with Virtual Queue Figure 8: received at class nodes and at all the nodes in a 1-second simulation run in the network configuration given in Figure 4. 1

11 2.5e+6 2e+6 1.5e+6 1e e+6 1.5e+6 5 Scale 1. Scale.5 Scale.2 Scale.1 Scale.5 Scale (a) Class with DropTail 2e+6 1e+6 2.5e+6 2e+6 1.5e+6 1e e+6 2e+6 1.5e+6 1e e+6 2e+6 1.5e+6 1e+6 5 Scale 1. Scale.5 Scale.2 Scale.1 Scale.5 Scale (c) Class with RED Scale 1. Scale.5 Scale.2 Scale.1 Scale.5 Scale (e) Class with REM Scale 1. Scale.5 Scale.2 Scale.1 Scale.5 Scale (g) Class with PI Scale 1. Scale.5 Scale.2 Scale.1 Scale.5 Scale (i) Class with Virtual Queue 2.5e+6 2e+6 1.5e+6 1e+6 Scale 1. Scale.5 5 Scale.2 Scale.1 Scale.5 Scale (b) All classes with DropTail 2.5e+6 2e+6 1.5e+6 1e+6 Scale 1. Scale.5 5 Scale.2 Scale.1 Scale.5 Scale e+6 2e+6 1.5e+6 (d) All classes with RED 1e+6 Scale 1. Scale.5 5 Scale.2 Scale.1 Scale.5 Scale e+6 2e+6 1.5e+6 (f) All classes with REM 1e+6 Scale 1. Scale.5 5 Scale.2 Scale.1 Scale.5 Scale e+6 2e+6 1.5e+6 (h) All classes with PI 1e+6 Scale 1. Scale.5 5 Scale.2 Scale.1 Scale.5 Scale (j) All classes with Virtual Queue Figure 9: received at the class nodes and at all the nodes in a 1-second simulation run in the network configuration given in Figure 5. 11

12 Scale 1. Scale.5 Scale Scale.1 Scale.5 Scale Scale 1. Scale.5 Scale.2 Scale.1 Scale.5 Scale Scale 1. Scale.5 Scale.2 (a) DropTail (b) RED (c) REM Scale 1. Scale.5 Scale.2 (d) PI Scale.1 Scale.5 Scale Scale 1. Scale.5 Scale.2 Scale.1 Scale.5 Scale.2 (e) Virtual Queue Scale.1 Scale.5 Scale.2 Figure 1: Execution time (sec.) required to carry out a 1-second simulation run in the network configuration given in Figure Scale 1. Scale.5 Scale.2 Scale.1 Scale.5 Scale Scale 1. Scale.5 Scale.2 Scale.1 Scale.5 Scale Scale 1. Scale.5 Scale.2 (a) DropTail (b) RED (c) REM Scale 1. Scale.5 Scale.2 (d) PI Scale.1 Scale.5 Scale Scale 1. Scale.5 Scale.2 Scale.1 Scale.5 Scale.2 (e) Virtual Queue Scale.1 Scale.5 Scale.2 Figure 11: Execution time (sec.) required to carry out a 1-second simulation run in the network configuration given in Figure 5. 12

13 scale 1. scale scale 1. scale scale 1. scale (a) DropTail (b) RED (c) REM scale 1. scale scale 1. scale (d) PI (e) Virtual Queue Figure 12: Instantaneous queue length versus time in the presence of both long-lived and short-lived TCP connections in the network configuration given in Figure 4, except that the capacities of all the links, excluding the bottleneck link, are increased to 1 Mb. The curve labeled with scale 1. is the instantaneous queue length in the original network and that labeled with scale.2 is that in the downscaled network Scale 1. 1 Scale.2 Scale.1 Scale Scale 1. 1 Scale.2 Scale.1 Scale Scale 1. 1 Scale.2 Scale.1 Scale (a) DropTail (b) RED (c) REM Scale 1. 1 Scale.2 Scale.1 Scale (d) PI Scale 1. 1 Scale.2 Scale.1 Scale (e) Virtual Queue Figure 13: received at class nodes in the presence of both long-lived and short-lived TCP connections in a 3-second simulation run in the network configuration given in Figure 4, except that the capacities of all the links, excluding the bottleneck link, are increased to 1 Mb. 13

14 Scale 1. Scale Scale.1 Scale Scale 1. Scale.2 Scale.1 Scale Scale 1. Scale.2 (a) DropTail (b) RED (c) REM Scale 1. Scale.2 (d) PI Scale.1 Scale Scale 1. Scale.2 Scale.1 Scale.2 (e) Virtual Queue Scale.1 Scale.2 Figure 14: Execution time (sec.) required to carry out a 3-second simulation run in the presence of both short-lived and long-lived TCP connections in the network configuration given in Figure 4, except that the capacities of all the links, excluding the bottleneck link, are increased to 1 Mb. [7] C. V. Hollot, V. Misra, D. F. Towsley, and W. Gong. On Designing Improved Controllers for AQM Routers Supporting TCP Flows. In Proceedings of IEEE INFOCOM 21, (Anchorage, Alaska), 21. [8] H. Kim and J. C. Hou. A Fast Simulation Framework for IEEE Operated WLANs. In Proceedings of ACM SIGMETRICS 24, (New York, New York), June 24. [9] H.KimandJ.C.Hou.NetworkCalculusBased Simulation for TCP Congestion Control: Theorems, Implementation and Evaluation. In Proceedings of IEEE INFOCOM 24, (Hong Kong, China), March 24. [1] S. Kunniyur and R. Srikant. Analysis and Design of an Adaptive Virtual Queue (AVQ). In Proceedings of ACM SIGCOMM 21, (San Diego, California), August 21. [11] D. Liu, D. R. Figueiredo, Y. Guo, J. Kurose, and D. Towsley. Fluid models and solutions for large-scale IP networks. In Proceedings of INFOCOM 21, (Anchorage, Alaska), April 21. [12] Y.Liu,F.L.Presti,V.Misra,D.Towsley,andY.Gu. Fluid Models and Solutions for Large-scale IP networks. In Proceedings of ACM SIGMETRICS 23 (San Diego, California), June 23. [13] N. Milidrag, G. Kesidis, and M. Devetsikiotis. An Overview of Fluid-Based Quick Simulation Techniques for Large Packet switched Communication Networks. In Proceedings of SPIE ITCom 21, (Denver, Colorado), August 21. [14] V. Misra, M. Gong, and D. Towsley. A Fluid-based Analysis of a Network of AQM Routers Supporting TCP Flows with an Application to RED. In Proceedings of ACM SIGCOMM 2 (Stockholm, Sweden), September 2. [15] V. Misra, W. Gong, and D. Towsley. Differential Equation Modeling and Analysis of TCP Window Size Behavior. In Proceedings of Performance 1999, (Istanbul, Turkey), October [16] J. Padhye, V. Firoiu, T. Towsley, and J. Kurose. Modeling TCP throughput: A Simple Model and its Empirical Validation. In Proceedings of ACM SIGCOMM 1998, (Vancouver, Canada), September [17] R. Pan, B. Prabhakar, K. Psounis, and D. Wischik. SHRiNK: A method for scaleable performance prediction and efficient network simulation. In Proceedings of IEEE INFOCOM 23, (San Francisco, California), March 23. [18] L. L. Perterson and B. S. Davie. Computer Networks: A Systems Approach. Morgan Kaufman, [19] S. Shakkottai and R. Srikant. How Good are Deterministic Fluid Models of Internet Congestion Control? In Proceedings of IEEE INFOCOM 22, (New York, New York), June 22. [2] The Mathworks Inc. MATLAB: The Language of Technical Computing. The Mathworks Inc., [21] Y. Wu and W. Gong. Time Stepped Simulation of Queuing Systems. In Technical Report, Department of Electrical and Computer Engineering, University of Massachusetts,

The Scaling Hypothesis: Simplifying the Prediction of Network Performance using Scaled-down Simulations

The Scaling Hypothesis: Simplifying the Prediction of Network Performance using Scaled-down Simulations The Scaling Hypothesis: Simplifying the Prediction of Network Performance using Scaled-down Simulations Konstantinos Psounis, Rong Pan, Balaji Prabhakar, Damon Wischik Stanford Univerity, Cambridge University

More information

Mixed Mode Simulation for IEEE operated WLANs: Integration of Packet Mode and Fluid Model Based Simulation

Mixed Mode Simulation for IEEE operated WLANs: Integration of Packet Mode and Fluid Model Based Simulation 1 Mixed Mode imulation for IEEE 82.11-operated WLANs: Integration of Mode and Fluid Model Based imulation Hwangnam Kim and Jennifer C. Hou Department of Computer cience University of Illinois at Urbana-Champaign

More information

Variable Step Fluid Simulation for Communication Network

Variable Step Fluid Simulation for Communication Network Variable Step Fluid Simulation for Communication Network Hongjoong Kim 1 and Junsoo Lee 2 1 Korea University, Seoul, Korea, hongjoong@korea.ac.kr 2 Sookmyung Women s University, Seoul, Korea, jslee@sookmyung.ac.kr

More information

! Network bandwidth shared by all users! Given routing, how to allocate bandwidth. " efficiency " fairness " stability. !

! Network bandwidth shared by all users! Given routing, how to allocate bandwidth.  efficiency  fairness  stability. ! Motivation Network Congestion Control EL 933, Class10 Yong Liu 11/22/2005! Network bandwidth shared by all users! Given routing, how to allocate bandwidth efficiency fairness stability! Challenges distributed/selfish/uncooperative

More information

Analyzing the Receiver Window Modification Scheme of TCP Queues

Analyzing the Receiver Window Modification Scheme of TCP Queues Analyzing the Receiver Window Modification Scheme of TCP Queues Visvasuresh Victor Govindaswamy University of Texas at Arlington Texas, USA victor@uta.edu Gergely Záruba University of Texas at Arlington

More information

Random Early Marking: Improving TCP Performance in DiffServ Assured Forwarding

Random Early Marking: Improving TCP Performance in DiffServ Assured Forwarding Random Early Marking: Improving TCP Performance in DiffServ Assured Forwarding Sandra Tartarelli and Albert Banchs Network Laboratories Heidelberg, NEC Europe Ltd. Abstract In the context of Active Queue

More information

Enhancing TCP Throughput over Lossy Links Using ECN-capable RED Gateways

Enhancing TCP Throughput over Lossy Links Using ECN-capable RED Gateways Enhancing TCP Throughput over Lossy Links Using ECN-capable RED Gateways Haowei Bai AES Technology Centers of Excellence Honeywell Aerospace 3660 Technology Drive, Minneapolis, MN 5548 E-mail: haowei.bai@honeywell.com

More information

Buffer Requirements for Zero Loss Flow Control with Explicit Congestion Notification. Chunlei Liu Raj Jain

Buffer Requirements for Zero Loss Flow Control with Explicit Congestion Notification. Chunlei Liu Raj Jain Buffer Requirements for Zero Loss Flow Control with Explicit Congestion Notification Chunlei Liu Raj Jain Department of Computer and Information Science The Ohio State University, Columbus, OH 432-277

More information

RECHOKe: A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks

RECHOKe: A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < : A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks Visvasuresh Victor Govindaswamy,

More information

On the Deployment of AQM Algorithms in the Internet

On the Deployment of AQM Algorithms in the Internet On the Deployment of AQM Algorithms in the Internet PAWEL MROZOWSKI and ANDRZEJ CHYDZINSKI Silesian University of Technology Institute of Computer Sciences Akademicka 16, Gliwice POLAND pmrozo@go2.pl andrzej.chydzinski@polsl.pl

More information

THE TCP specification that specifies the first original

THE TCP specification that specifies the first original 1 Median Filtering Simulation of Bursty Traffic Auc Fai Chan, John Leis Faculty of Engineering and Surveying University of Southern Queensland Toowoomba Queensland 4350 Abstract The estimation of Retransmission

More information

Hybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks

Hybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks Hybrid Control and Switched Systems Lecture #17 Hybrid Systems Modeling of Communication Networks João P. Hespanha University of California at Santa Barbara Motivation Why model network traffic? to validate

More information

Fluid-based Analysis of a Network of AQM Routers Supporting TCP Flows with an Application to RED

Fluid-based Analysis of a Network of AQM Routers Supporting TCP Flows with an Application to RED Fluid-based Analysis of a Network of AQM Routers Supporting TCP Flows with an Application to RED Vishal Misra Department of Computer Science University of Massachusetts Amherst MA 13 misra@cs.umass.edu

More information

An Analytical RED Function Design Guaranteeing Stable System Behavior

An Analytical RED Function Design Guaranteeing Stable System Behavior An Analytical RED Function Design Guaranteeing Stable System Behavior Erich Plasser, Thomas Ziegler Telecommunications Research Center Vienna {plasser, ziegler}@ftw.at Abstract This paper introduces the

More information

Stability Analysis of a Window-based Flow Control Mechanism for TCP Connections with Different Propagation Delays

Stability Analysis of a Window-based Flow Control Mechanism for TCP Connections with Different Propagation Delays Stability Analysis of a Window-based Flow Control Mechanism for TCP Connections with Different Propagation Delays Keiichi Takagaki Hiroyuki Ohsaki Masayuki Murata Graduate School of Engineering Science,

More information

NETWORKING research has taken a multipronged approach

NETWORKING research has taken a multipronged approach IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 12, DECEMBER 2006 2313 Performance Preserving Topological Downscaling of Internet-Like Networks Fragkiskos Papadopoulos, Konstantinos Psounis,

More information

Improving TCP Performance over Wireless Networks using Loss Predictors

Improving TCP Performance over Wireless Networks using Loss Predictors Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it

More information

Appendix B. Standards-Track TCP Evaluation

Appendix B. Standards-Track TCP Evaluation 215 Appendix B Standards-Track TCP Evaluation In this appendix, I present the results of a study of standards-track TCP error recovery and queue management mechanisms. I consider standards-track TCP error

More information

Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of RED gateways

Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of RED gateways INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. 2002; 15:899 906 (DOI: 10.1002/dac.571) Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of

More information

An Adaptive Neuron AQM for a Stable Internet

An Adaptive Neuron AQM for a Stable Internet An Adaptive Neuron AQM for a Stable Internet Jinsheng Sun and Moshe Zukerman The ARC Special Research Centre for Ultra-Broadband Information Networks, Department of Electrical and Electronic Engineering,

More information

Steady State Analysis of the RED Gateway: Stability, Transient Behavior, and Parameter Setting

Steady State Analysis of the RED Gateway: Stability, Transient Behavior, and Parameter Setting Steady State Analysis of the RED Gateway: Stability, Transient Behavior, and Parameter Setting Hiroyuki Ohsaki, Masayuki Murata, and Hideo Miyahara Graduate School of Engineering Science, Osaka University

More information

INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN

INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 A SURVEY ON EXPLICIT FEEDBACK BASED CONGESTION CONTROL PROTOCOLS Nasim Ghasemi 1, Shahram Jamali 2 1 Department of

More information

Scalable Fluid Models and Simulations for Large-Scale IP Networks

Scalable Fluid Models and Simulations for Large-Scale IP Networks Scalable Fluid Models and Simulations for Large-Scale IP Networks YONG LIU University of Massachusetts, Amherst FRANCESCO L. PRESTI Universita dell Aquila VISHAL MISRA Columbia University DONALD F. TOWSLEY

More information

Effect of Number of Drop Precedences in Assured Forwarding

Effect of Number of Drop Precedences in Assured Forwarding Internet Engineering Task Force Internet Draft Expires: January 2000 Mukul Goyal Arian Durresi Raj Jain Chunlei Liu The Ohio State University July, 999 Effect of Number of Drop Precedences in Assured Forwarding

More information

Congestion Control for High Bandwidth-delay Product Networks

Congestion Control for High Bandwidth-delay Product Networks Congestion Control for High Bandwidth-delay Product Networks Dina Katabi, Mark Handley, Charlie Rohrs Presented by Chi-Yao Hong Adapted from slides by Dina Katabi CS598pbg Sep. 10, 2009 Trends in the Future

More information

Congestion Control for High Bandwidth-delay Product Networks. Dina Katabi, Mark Handley, Charlie Rohrs

Congestion Control for High Bandwidth-delay Product Networks. Dina Katabi, Mark Handley, Charlie Rohrs Congestion Control for High Bandwidth-delay Product Networks Dina Katabi, Mark Handley, Charlie Rohrs Outline Introduction What s wrong with TCP? Idea of Efficiency vs. Fairness XCP, what is it? Is it

More information

RED behavior with different packet sizes

RED behavior with different packet sizes RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,

More information

A Hybrid Systems Modeling Framework for Fast and Accurate Simulation of Data Communication Networks. Motivation

A Hybrid Systems Modeling Framework for Fast and Accurate Simulation of Data Communication Networks. Motivation A Hybrid Systems Modeling Framework for Fast and Accurate Simulation of Data Communication Networks Stephan Bohacek João P. Hespanha Junsoo Lee Katia Obraczka University of Delaware University of Calif.

More information

A Note on the Stability Requirements of Adaptive Virtual Queue

A Note on the Stability Requirements of Adaptive Virtual Queue A ote on the Stability Requirements of Adaptive Virtual Queue Dina Katabi MIT-LCS dk@mit.edu Charles Blake MIT-LCS cb@mit.edu Abstract Choosing the correct values for the parameters of an Active Queue

More information

Performance Evaluation of Controlling High Bandwidth Flows by RED-PD

Performance Evaluation of Controlling High Bandwidth Flows by RED-PD Performance Evaluation of Controlling High Bandwidth Flows by RED-PD Osama Ahmed Bashir Md Asri Ngadi Universiti Teknology Malaysia (UTM) Yahia Abdalla Mohamed Mohamed Awad ABSTRACT This paper proposed

More information

A Generalization of a TCP Model: Multiple Source-Destination Case. with Arbitrary LAN as the Access Network

A Generalization of a TCP Model: Multiple Source-Destination Case. with Arbitrary LAN as the Access Network A Generalization of a TCP Model: Multiple Source-Destination Case with Arbitrary LAN as the Access Network Oleg Gusak and Tu rul Dayar Department of Computer Engineering and Information Science Bilkent

More information

A CONTROL THEORETICAL APPROACH TO A WINDOW-BASED FLOW CONTROL MECHANISM WITH EXPLICIT CONGESTION NOTIFICATION

A CONTROL THEORETICAL APPROACH TO A WINDOW-BASED FLOW CONTROL MECHANISM WITH EXPLICIT CONGESTION NOTIFICATION A CONTROL THEORETICAL APPROACH TO A WINDOW-BASED FLOW CONTROL MECHANISM WITH EXPLICIT CONGESTION NOTIFICATION Hiroyuki Ohsaki, Masayuki Murata, Toshimitsu Ushio, and Hideo Miyahara Department of Information

More information

Three-section Random Early Detection (TRED)

Three-section Random Early Detection (TRED) Three-section Random Early Detection (TRED) Keerthi M PG Student Federal Institute of Science and Technology, Angamaly, Kerala Abstract There are many Active Queue Management (AQM) mechanisms for Congestion

More information

An Adaptive Virtual Queue (AVQ) Algorithm for Active Queue Management

An Adaptive Virtual Queue (AVQ) Algorithm for Active Queue Management University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering April 2004 An Adaptive Virtual Queue (AVQ) Algorithm for Active Queue Management Srisankar

More information

Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes

Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes Zhili Zhao Dept. of Elec. Engg., 214 Zachry College Station, TX 77843-3128 A. L. Narasimha Reddy

More information

ACTIVE QUEUE MANAGEMENT ALGORITHM WITH A RATE REGULATOR. Hyuk Lim, Kyung-Joon Park, Eun-Chan Park and Chong-Ho Choi

ACTIVE QUEUE MANAGEMENT ALGORITHM WITH A RATE REGULATOR. Hyuk Lim, Kyung-Joon Park, Eun-Chan Park and Chong-Ho Choi Copyright 22 IFAC 15th Triennial World Congress, Barcelona, Spain ACTIVE QUEUE MANAGEMENT ALGORITHM WITH A RATE REGULATOR Hyuk Lim, Kyung-Joon Park, Eun-Chan Park and Chong-Ho Choi School of Electrical

More information

Integration of fluid-based analytical model with Packet-Level Simulation for Analysis of Computer Networks

Integration of fluid-based analytical model with Packet-Level Simulation for Analysis of Computer Networks Integration of fluid-based analytical model with Packet-Level Simulation for Analysis of Computer Networks Tak Kin Yung, Jay Martin, Mineo Takai, and Rajive Bagrodia Department of Computer Science University

More information

Markov Model Based Congestion Control for TCP

Markov Model Based Congestion Control for TCP Markov Model Based Congestion Control for TCP Shan Suthaharan University of North Carolina at Greensboro, Greensboro, NC 27402, USA ssuthaharan@uncg.edu Abstract The Random Early Detection (RED) scheme

More information

Congestion Control. Andreas Pitsillides University of Cyprus. Congestion control problem

Congestion Control. Andreas Pitsillides University of Cyprus. Congestion control problem Congestion Control Andreas Pitsillides 1 Congestion control problem growing demand of computer usage requires: efficient ways of managing network traffic to avoid or limit congestion in cases where increases

More information

Reasons not to Parallelize TCP Connections for Fast Long-Distance Networks

Reasons not to Parallelize TCP Connections for Fast Long-Distance Networks Reasons not to Parallelize TCP Connections for Fast Long-Distance Networks Zongsheng Zhang Go Hasegawa Masayuki Murata Osaka University Contents Introduction Analysis of parallel TCP mechanism Numerical

More information

Enhancing TCP Throughput over Lossy Links Using ECN-Capable Capable RED Gateways

Enhancing TCP Throughput over Lossy Links Using ECN-Capable Capable RED Gateways Enhancing TCP Throughput over Lossy Links Using ECN-Capable Capable RED Gateways Haowei Bai Honeywell Aerospace Mohammed Atiquzzaman School of Computer Science University of Oklahoma 1 Outline Introduction

More information

Congestion Avoidance

Congestion Avoidance Congestion Avoidance Richard T. B. Ma School of Computing National University of Singapore CS 5229: Advanced Compute Networks References K. K. Ramakrishnan, Raj Jain, A Binary Feedback Scheme for Congestion

More information

On the Transition to a Low Latency TCP/IP Internet

On the Transition to a Low Latency TCP/IP Internet On the Transition to a Low Latency TCP/IP Internet Bartek Wydrowski and Moshe Zukerman ARC Special Research Centre for Ultra-Broadband Information Networks, EEE Department, The University of Melbourne,

More information

The Fluid Flow Approximation of the TCP Vegas and Reno Congestion Control Mechanism

The Fluid Flow Approximation of the TCP Vegas and Reno Congestion Control Mechanism The Fluid Flow Approximation of the TCP Vegas and Reno Congestion Control Mechanism Adam Domański 2, Joanna Domańska 1, Michele Pagano 3, and Tadeusz Czachórski 1(B) 1 Institute of Theoretical and Applied

More information

Time-Step Network Simulation

Time-Step Network Simulation Time-Step Network Simulation Andrzej Kochut Udaya Shankar University of Maryland, College Park Introduction Goal: Fast accurate performance evaluation tool for computer networks Handles general control

More information

Applying Speculative Technique to Improve TCP Throughput over Lossy Links

Applying Speculative Technique to Improve TCP Throughput over Lossy Links Applying Speculative Technique to Improve TCP Throughput over Lossy Links Haowei Bai Honeywell Labs 3660 Technology Drive Minneapolis, MN 55418 haowei.bai@honeywell.com David Lilja Electrical and Computer

More information

A COMPARATIVE STUDY OF TCP RENO AND TCP VEGAS IN A DIFFERENTIATED SERVICES NETWORK

A COMPARATIVE STUDY OF TCP RENO AND TCP VEGAS IN A DIFFERENTIATED SERVICES NETWORK A COMPARATIVE STUDY OF TCP RENO AND TCP VEGAS IN A DIFFERENTIATED SERVICES NETWORK Ruy de Oliveira Federal Technical School of Mato Grosso Brazil Gerência de Eletroeletrônica E-mail: ruy@lrc.feelt.ufu.br

More information

2 University of Würzburg, Institute of Computer Science. Research Report Series

2 University of Würzburg, Institute of Computer Science. Research Report Series University of Würzburg Institute of Computer Science Research Report Series An Algorithmic Framework for Discrete-Time Flow-Level Simulation of Data Networks Lasse Jansen 1,2, Ivan Gojmerac 1, Michael

More information

Random Early Detection (RED) gateways. Sally Floyd CS 268: Computer Networks

Random Early Detection (RED) gateways. Sally Floyd CS 268: Computer Networks Random Early Detection (RED) gateways Sally Floyd CS 268: Computer Networks floyd@eelblgov March 20, 1995 1 The Environment Feedback-based transport protocols (eg, TCP) Problems with current Drop-Tail

More information

A Framework For Managing Emergent Transmissions In IP Networks

A Framework For Managing Emergent Transmissions In IP Networks A Framework For Managing Emergent Transmissions In IP Networks Yen-Hung Hu Department of Computer Science Hampton University Hampton, Virginia 23668 Email: yenhung.hu@hamptonu.edu Robert Willis Department

More information

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA CS 556 Advanced Computer Networks Spring 2011 Solutions to Midterm Test March 10, 2011 YOUR NAME: Abraham MATTA This test is closed books. You are only allowed to have one sheet of notes (8.5 11 ). Please

More information

Performance Analysis of Assured Forwarding

Performance Analysis of Assured Forwarding Internet Engineering Task Force Internet Draft Expires: August 2000 Mukul Goyal Arian Durresi Raj Jain Chunlei Liu The Ohio State University February 2000 Performance Analysis of Assured Forwarding Status

More information

An Enhanced Slow-Start Mechanism for TCP Vegas

An Enhanced Slow-Start Mechanism for TCP Vegas An Enhanced Slow-Start Mechanism for TCP Vegas Cheng-Yuan Ho a, Yi-Cheng Chan b, and Yaw-Chung Chen a a Department of Computer Science and Information Engineering National Chiao Tung University b Department

More information

A Study of Burstiness in TCP Flows

A Study of Burstiness in TCP Flows A Study of Burstiness in TCP Flows Srinivas Shakkottai 1, Nevil Brownlee 2, and K. C. Claffy 3 1 Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign, USA email:

More information

Analysis and Design of Controllers for AQM Routers Supporting TCP Flows. C. V. Hollot, V. Misra, D. Towsley and W. Gong

Analysis and Design of Controllers for AQM Routers Supporting TCP Flows. C. V. Hollot, V. Misra, D. Towsley and W. Gong A Study Group Presentation Analysis and esign of Controllers for AQM outers Supporting TCP Flows C. V. Hollot, V. Misra,. Towsley and W. Gong Presented by: Tan Chee-Wei Advisors: Professor Winston Chiu,

More information

One More Bit Is Enough

One More Bit Is Enough One More Bit Is Enough Yong Xia, RPI Lakshmi Subramanian, UCB Ion Stoica, UCB Shiv Kalyanaraman, RPI SIGCOMM 05, Philadelphia, PA 08 / 23 / 2005 Motivation #1: TCP doesn t work well in high b/w or delay

More information

Video Streaming in Wireless Environments

Video Streaming in Wireless Environments Video Streaming in Wireless Environments Manoj Kumar C Advisor Prof. Sridhar Iyer Kanwal Rekhi School of Information Technology Indian Institute of Technology, Bombay Mumbai 1 Motivation Refers to real-time

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Tuning RED for Web Traffic

Tuning RED for Web Traffic Tuning RED for Web Traffic Mikkel Christiansen, Kevin Jeffay, David Ott, Donelson Smith UNC, Chapel Hill SIGCOMM 2000, Stockholm subsequently IEEE/ACM Transactions on Networking Vol. 9, No. 3 (June 2001)

More information

TFRC and RTT Thresholds Interdependence in a Selective Retransmission Scheme

TFRC and RTT Thresholds Interdependence in a Selective Retransmission Scheme TFRC and RTT s Interdependence in a Selective Retransmission Scheme Árpád Huszák, Sándor Imre Budapest University of Technology and Economics, Department of Telecommunications Budapest, Hungary Email:

More information

PERFORMANCE COMPARISON OF TRADITIONAL SCHEDULERS IN DIFFSERV ARCHITECTURE USING NS

PERFORMANCE COMPARISON OF TRADITIONAL SCHEDULERS IN DIFFSERV ARCHITECTURE USING NS PERFORMANCE COMPARISON OF TRADITIONAL SCHEDULERS IN DIFFSERV ARCHITECTURE USING NS Miklós Lengyel János Sztrik Department of Informatics Systems and Networks University of Debrecen H-4010 Debrecen, P.O.

More information

Congestion Propagation among Routers in the Internet

Congestion Propagation among Routers in the Internet Congestion Propagation among Routers in the Internet Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology, Osaka University -, Yamadaoka, Suita, Osaka,

More information

A New Rate-based Active Queue Management: Adaptive Virtual Queue RED

A New Rate-based Active Queue Management: Adaptive Virtual Queue RED A New Rate-based Active Queue Management: Adaptive Virtual Queue RED Do J. Byun and John S. Baras, Fellow, IEEE Department of Computer Science, University of Maryland at College Park dbyun@hns.com, baras@isr.umd.edu

More information

On Network Dimensioning Approach for the Internet

On Network Dimensioning Approach for the Internet On Dimensioning Approach for the Internet Masayuki Murata ed Environment Division Cybermedia Center, (also, Graduate School of Engineering Science, ) e-mail: murata@ics.es.osaka-u.ac.jp http://www-ana.ics.es.osaka-u.ac.jp/

More information

Analysis of the interoperation of the Integrated Services and Differentiated Services Architectures

Analysis of the interoperation of the Integrated Services and Differentiated Services Architectures Analysis of the interoperation of the Integrated Services and Differentiated Services Architectures M. Fabiano P.S. and M.A. R. Dantas Departamento da Ciência da Computação, Universidade de Brasília, 70.910-970

More information

CS 268: Lecture 7 (Beyond TCP Congestion Control)

CS 268: Lecture 7 (Beyond TCP Congestion Control) Outline CS 68: Lecture 7 (Beyond TCP Congestion Control) TCP-Friendly Rate Control (TFRC) explicit Control Protocol Ion Stoica Computer Science Division Department of Electrical Engineering and Computer

More information

Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks

Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks Sergey Gorinsky Harrick Vin Technical Report TR2000-32 Department of Computer Sciences, University of Texas at Austin Taylor Hall

More information

TCP Throughput Analysis with Variable Packet Loss Probability for Improving Fairness among Long/Short-lived TCP Connections

TCP Throughput Analysis with Variable Packet Loss Probability for Improving Fairness among Long/Short-lived TCP Connections TCP Throughput Analysis with Variable Packet Loss Probability for Improving Fairness among Long/Short-lived TCP Connections Koichi Tokuda Go Hasegawa Masayuki Murata Graduate School of Information Science

More information

Edge versus Host Pacing of TCP Traffic in Small Buffer Networks

Edge versus Host Pacing of TCP Traffic in Small Buffer Networks Edge versus Host Pacing of TCP Traffic in Small Buffer Networks Hassan Habibi Gharakheili 1, Arun Vishwanath 2, Vijay Sivaraman 1 1 University of New South Wales (UNSW), Australia 2 University of Melbourne,

More information

MaVIS: Media-aware Video Streaming Mechanism

MaVIS: Media-aware Video Streaming Mechanism MaVIS: Media-aware Video Streaming Mechanism Sunhun Lee and Kwangsue Chung School of Electronics Engineering, Kwangwoon University, Korea sunlee@adamskwackr and kchung@kwackr Abstract Existing streaming

More information

Multicast Transport Protocol Analysis: Self-Similar Sources *

Multicast Transport Protocol Analysis: Self-Similar Sources * Multicast Transport Protocol Analysis: Self-Similar Sources * Mine Çağlar 1 Öznur Özkasap 2 1 Koç University, Department of Mathematics, Istanbul, Turkey 2 Koç University, Department of Computer Engineering,

More information

Adaptive RTP Rate Control Method

Adaptive RTP Rate Control Method 2011 35th IEEE Annual Computer Software and Applications Conference Workshops Adaptive RTP Rate Control Method Uras Tos Department of Computer Engineering Izmir Institute of Technology Izmir, Turkey urastos@iyte.edu.tr

More information

Oscillations and Buffer Overflows in Video Streaming under Non-Negligible Queuing Delay

Oscillations and Buffer Overflows in Video Streaming under Non-Negligible Queuing Delay Oscillations and Buffer Overflows in Video Streaming under Non-Negligible Queuing Delay Yueping Zhang and Dmitri Loguinov Department of Computer Science Texas A&M University, College Station, TX 77843

More information

ISSN: International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 4, April 2013

ISSN: International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 4, April 2013 Balanced window size Allocation Mechanism for Congestion control of Transmission Control Protocol based on improved bandwidth Estimation. Dusmant Kumar Sahu 1, S.LaKshmiNarasimman2, G.Michale 3 1 P.G Scholar,

More information

Reduction of queue oscillation in the next generation Internet routers. By: Shan Suthaharan

Reduction of queue oscillation in the next generation Internet routers. By: Shan Suthaharan Reduction of queue oscillation in the next generation Internet routers By: Shan Suthaharan S. Suthaharan (2007), Reduction of queue oscillation in the next generation Internet routers, Computer Communications

More information

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Veselin Rakocevic School of Engineering and Mathematical Sciences City University London EC1V HB, UK V.Rakocevic@city.ac.uk

More information

Inconsistency of Logical and Physical Topologies for Overlay Networks and Its Effect on File Transfer Delay

Inconsistency of Logical and Physical Topologies for Overlay Networks and Its Effect on File Transfer Delay Inconsistency of Logical and Physical Topologies for Overlay Networks and Its Effect on File Transfer Delay Yasuo Tamura a, Shoji Kasahara a,, Yutaka Takahashi a, Satoshi Kamei b, and Ryoichi Kawahara

More information

100 Mbps. 100 Mbps S1 G1 G2. 5 ms 40 ms. 5 ms

100 Mbps. 100 Mbps S1 G1 G2. 5 ms 40 ms. 5 ms The Influence of the Large Bandwidth-Delay Product on TCP Reno, NewReno, and SACK Haewon Lee Λ, Soo-hyeoung Lee, and Yanghee Choi School of Computer Science and Engineering Seoul National University San

More information

On TCP friendliness of VOIP traffic

On TCP friendliness of VOIP traffic On TCP friendliness of VOIP traffic By Rashmi Parthasarathy WSU ID # 10975537 A report submitted in partial fulfillment of the requirements of CptS 555 Electrical Engineering and Computer Science Department

More information

Ashortage of IPv4 address space has

Ashortage of IPv4 address space has INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2005; 15: 411 419 Published online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/nem.582 A measurement study of network

More information

Utility-Based Rate Control in the Internet for Elastic Traffic

Utility-Based Rate Control in the Internet for Elastic Traffic 272 IEEE TRANSACTIONS ON NETWORKING, VOL. 10, NO. 2, APRIL 2002 Utility-Based Rate Control in the Internet for Elastic Traffic Richard J. La and Venkat Anantharam, Fellow, IEEE Abstract In a communication

More information

Impact of Short-lived TCP Flows on TCP Link Utilization over 10Gbps High-speed Networks

Impact of Short-lived TCP Flows on TCP Link Utilization over 10Gbps High-speed Networks Impact of Short-lived TCP Flows on TCP Link Utilization over Gbps High-speed Networks Lin Xue, Chui-hui Chiu, and Seung-Jong Park Department of Computer Science, Center for Computation & Technology, Louisiana

More information

Performance Consequences of Partial RED Deployment

Performance Consequences of Partial RED Deployment Performance Consequences of Partial RED Deployment Brian Bowers and Nathan C. Burnett CS740 - Advanced Networks University of Wisconsin - Madison ABSTRACT The Internet is slowly adopting routers utilizing

More information

6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long

6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long 6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long Please read Chapter 19 of the 6.02 book for background, especially on acknowledgments (ACKs), timers,

More information

Worst-case Ethernet Network Latency for Shaped Sources

Worst-case Ethernet Network Latency for Shaped Sources Worst-case Ethernet Network Latency for Shaped Sources Max Azarov, SMSC 7th October 2005 Contents For 802.3 ResE study group 1 Worst-case latency theorem 1 1.1 Assumptions.............................

More information

Routing in a Delay Tolerant Network

Routing in a Delay Tolerant Network Routing in a Delay Tolerant Network Vladislav Marinov Jacobs University Bremen March 31st, 2008 Vladislav Marinov Routing in a Delay Tolerant Network 1 Internet for a Remote Village Dial-up connection

More information

Improving Internet Performance through Traffic Managers

Improving Internet Performance through Traffic Managers Improving Internet Performance through Traffic Managers Ibrahim Matta Computer Science Department Boston University Computer Science A Glimpse of Current Internet b b b b Alice c TCP b (Transmission Control

More information

A model for Endpoint Admission Control Based on Packet Loss

A model for Endpoint Admission Control Based on Packet Loss A model for Endpoint Admission Control Based on Packet Loss Ignacio Más and Gunnar Karlsson ACCESS Linneaus Center School of Electrical Engineering KTH, Royal Institute of Technology 44 Stockholm, Sweden

More information

ON THE IMPACT OF CONCURRENT DOWNLOADS

ON THE IMPACT OF CONCURRENT DOWNLOADS Proceedings of the 2001 Winter Simulation Conference B.A.Peters,J.S.Smith,D.J.Medeiros,andM.W.Rohrer,eds. ON THE IMPACT OF CONCURRENT DOWNLOADS Yong Liu Weibo Gong Department of Electrical & Computer Engineering

More information

Doctoral Written Exam in Networking, Fall 2008

Doctoral Written Exam in Networking, Fall 2008 Doctoral Written Exam in Networking, Fall 2008 December 5, 2008 Answer all parts of all questions. There are four multi-part questions, each of equal weight. Turn in your answers by Thursday, December

More information

An algorithm for Performance Analysis of Single-Source Acyclic graphs

An algorithm for Performance Analysis of Single-Source Acyclic graphs An algorithm for Performance Analysis of Single-Source Acyclic graphs Gabriele Mencagli September 26, 2011 In this document we face with the problem of exploiting the performance analysis of acyclic graphs

More information

Increase-Decrease Congestion Control for Real-time Streaming: Scalability

Increase-Decrease Congestion Control for Real-time Streaming: Scalability Increase-Decrease Congestion Control for Real-time Streaming: Scalability Dmitri Loguinov City University of New York Hayder Radha Michigan State University 1 Motivation Current Internet video streaming

More information

AN IMPROVED STEP IN MULTICAST CONGESTION CONTROL OF COMPUTER NETWORKS

AN IMPROVED STEP IN MULTICAST CONGESTION CONTROL OF COMPUTER NETWORKS AN IMPROVED STEP IN MULTICAST CONGESTION CONTROL OF COMPUTER NETWORKS Shaikh Shariful Habib Assistant Professor, Computer Science & Engineering department International Islamic University Chittagong Bangladesh

More information

Exercises TCP/IP Networking With Solutions

Exercises TCP/IP Networking With Solutions Exercises TCP/IP Networking With Solutions Jean-Yves Le Boudec Fall 2009 3 Module 3: Congestion Control Exercise 3.2 1. Assume that a TCP sender, called S, does not implement fast retransmit, but does

More information

Investigating the Use of Synchronized Clocks in TCP Congestion Control

Investigating the Use of Synchronized Clocks in TCP Congestion Control Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle (UNC-CH) November 16-17, 2001 Univ. of Maryland Symposium The Problem TCP Reno congestion control reacts only to packet

More information

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK I.J.E.M.S., VOL.2 (3) 211: 163-171 ISSN 2229-6X PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION Jai Kumar and U.C. Jaiswal Department of Computer Science and Engineering, Madan

More information

Buffer Sizing in a Combined Input Output Queued (CIOQ) Switch

Buffer Sizing in a Combined Input Output Queued (CIOQ) Switch Buffer Sizing in a Combined Input Output Queued (CIOQ) Switch Neda Beheshti, Nick Mckeown Stanford University Abstract In all internet routers buffers are needed to hold packets during times of congestion.

More information

Analysis of Dynamic Behaviors of Many TCP Connections Sharing Tail Drop/RED Routers

Analysis of Dynamic Behaviors of Many TCP Connections Sharing Tail Drop/RED Routers Analysis of Dynamic Behaviors of Many TCP Connections Sharing Tail Drop/RED Routers Go Hasegawa and Masayuki Murata Cybermedia Center, Osaka University -3, Machikaneyama, Toyonaka, Osaka 560-853, Japan

More information

RECENT advances in the modeling and analysis of TCP/IP networks have led to better understanding of AQM dynamics.

RECENT advances in the modeling and analysis of TCP/IP networks have led to better understanding of AQM dynamics. IEEE GLOBECOM 23 Conference Paper; ACM SIGMETRICS 23 Student Poster A Self-Tuning Structure for Adaptation in TCP/AQM Networks 1 Honggang Zhang, C. V. Hollot, Don Towsley and Vishal Misra Abstract Since

More information

SHRiNK: Enabling Scaleable Performance Prediction and Efficient Simulation of Networks

SHRiNK: Enabling Scaleable Performance Prediction and Efficient Simulation of Networks SHRiNK: Enabling Scaleable Performance Prediction and Efficient Simulation of Networks Rong Pan, Konstantinos Psounis, Balaji Prabhakar, Damon Wischik Stanford Univerity, Cambridge University Email: rong,

More information